Abstract
Using traditional logs that contain only before and after images of data items and record neither any of the read operations nor actual mathematical or logical operations associated with an update, a complete damage assessment and repair of the database is not possible in the post Information Warfare scenario. In this research, a new logging protocol is proposed which records all appropriate information required for the complete repair of a database that was updated by committed but affected transactions. This information includes various predicates and statements used in the transaction. An algorithm to incorporate these in the log is offered. Based on this new log, a method to perform damage assessment and recovery is presented.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35587-0_24
Chapter PDF
Similar content being viewed by others
References
P. Amman, S. Jajodia, C. D. McCollum, and B. Blaustein, Surviving Information Warfare Attacks on Databases, Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 1997.
P. A. Bernstein, V. Hadzilacos, and N. Goodman, Concurrency Control and Recovery in Database Systems, Addison-Wesley, Reading, MA, 1987.
R. Elmasri, and S. B. Navathe, Fundamentals of Database Systems, Third Edition, Addison-Wesley, Menlo Park, CA, 2000.
K. P. Eswaran, J. N. Gray, R. A. Lorie, and I. L. Traiger, The Notions of Consistency and Predicate Locks in a Database System, CACM, 19 (11), November 1976.
J. Gray and A. Reuter, Transaction Processing: Concepts and Techniques, Morgan Kauffmann, San Mateo, CA, 1993.
T. Haerder and A. Reuter, Principles of Transaction-Oriented Database Recovery, Computing.Surveys, 15 (4), December 1983.
S. Jajodia, C. D. McCollum, and P. Amman, Trusted Recovery, Communications of the ACM, 42 (7), pp. 71–75, July 1999.
H. F. Korth and A. Silberschatz, Database System Concepts, Second Edition, McGraw-Hill, New York City, NY, 1991.
P. Liu, P. Amman, and S. Jajodia, Rewriting Histories: Recovering from Malicious Transactions, Distributed and Parallel Databases, 8 (1), pp. 7–40, January 2000.
C. Mohan et. al, ARIES: A Transaction Recovery Method Supporting Fine-granularity Locking and Partial Rollbacks Using Write-Ahead Logging, ACM Transactions on Database Systems, 17 (1), March 1982.
M. T. Ozsu and P. Valduriez, Principles of Distributed Database Systems, Second Edition, Prentice-Hall, Upper Saddle River, NJ, 1999.
B. Panda and J. Giordano, Defensive Information Warfare, CACM, July 1999.
B. Panda and J. Giordano, Reconstructing the Database After Electronic Attacks, Database Security XII: Status and Prospects, S. Jajodia (editor ), Kluwer Academic Publishers, 1999.
S. Patnaik and B. Panda, Dependency Based Logging for Database Survivability from Hostile Transactions, Proceedings of the 12th International Conference on Computer Applications in Industry and Engineering, November 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Sobhan, R., Panda, B. (2002). Reorganization of the Database Log for Information Warfare Data Recovery. In: Olivier, M.S., Spooner, D.L. (eds) Database and Application Security XV. IFIP — The International Federation for Information Processing, vol 87. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35587-0_9
Download citation
DOI: https://doi.org/10.1007/978-0-387-35587-0_9
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-1028-1
Online ISBN: 978-0-387-35587-0
eBook Packages: Springer Book Archive